The Win32/Genetik heuristics began detecting our Juniper SSL VPN client for remote access this morning. This is breaking a critical business app, and while I have set up scanning exclusions to prevent any more detections I am unable to remotely manage the quarantine of these systems any my ability to help those that have already been affected is limited.

A sample has been sent to infected@eset.com with the subject "URGENT FALSE POSITIVE Juniper SSL VPN" at 8:44am EST but if there is anything that can be done to float this one to the top of the queue I would appreciate it.